is stored without sanitizing inside the logfile and the script part is
executed, if the geronimo-admin is accessing the web-access-log-viewer.
An example attack can steal the current session-id of the admin, which
is stored as a cookie.